Dear Reader,
It has been hectic summer for us at Cyber Protection Magazine as we try to keep up with the world’s increasing concern over cybercrime containment. We even hit a milestone in August as we published our 100th post. Not bad for a fledgling publication less than a year old.
The consolidation of technologies providing various forms of protection now includes blockchain and cloud-based SIEM. Black Hat Las Vegas dominated our coverage and the connections we made with exhibitors and presenters will be following us for the coming months
Plenty of topics to cover, so with no further ado: enjoy reading our newsletter.
Best regards
Patrick Boch & Lou Covey Editors |
| |
Video Highlights
Our Video Bytes series is becoming quite the library of expert guidance. We had a two-parter with Mike Kiser, Senior Strategist at Sailpoint and Alan Grau, VP of IoT at Sectigo discussing the definition of identity. Surya Varanasi, CTO of StorCentric, gave some tips on protecting yourself from ransomware through backups, and Gijsbert Janssen van Doorn gave us an update on why ransomware is so popular. |
| |
Video Byte Special: What is Identity? |
What is that identity that people always talk about and why does it need protection? We spoke with two experts on the matter. |
|
| |
Video Byte: Why is Ransomware so popular? |
Looking at some of the recent cybersecurity headlines , there is a lot of talk on ransomware. Apparently, ransomware is by far the most "popular" form of attack. We wondered… |
|
| |
Podcasts
Our US editor, Lou Covey debated EU editor Patrick Boch on whether Apple’s (now delayed) plan to scan iCloud accounts for child porn is a good idea and (spoiler, we still don’t agree.) |
| |
Apple's porn scan is bad, unless you think it is good |
US editor Lou Covey thinks the GDPR, CCPA and a host of other potential legislation has already begun a slide toward government control of technology. On the other hand, EU editor Patrick Boch thinks Apple’s decision in the impetus. In either case, one has to decide whether making it difficult for child abusers to pursue their kink is worth the potential loss of privacy, or if privacy is an absolute right. |
|
|
| |
Black Hat
Our US editor attended Black Hat Conference 2021 virtually and came back with some blockbuster pronouncements. First was the keynote by Matt Tait, COO of Corellium, who said the marketing practices of the security research industry enable cybercrime worldwide. Then there was a panel on how CEOs are feeling the heat from board members to adequately defend companies from cyberattacks. We are still digging out on the massive amount of data from that conference so expect more to come. |
| |
Researchers unwittingly assist in cybercrime |
At Black Hat Conference 2021, Matt Tait said the marketing practices of the security research industry enable cybercrime worldwide. Considering that the conference is dedicated to that industry, it was… |
|
| |
Panel says CEOs facing pressure to bolster security |
CEOs in large enterprises are feeling the heat from board members to adequately defend companies - Cyber Protection Magazine reports from Black Hat USA 2021 #BHUSA #BlackHat |
|
| |
Micropages
We’d like to thank our small but growing group of sponsors over the past 8 months and highlight one: Zerto, bringing together disaster recovery, backup, and data mobility into a single, simple cloud data management and protection solution. You can visit their Cyber Protection Magazine micropage here. |
| |
Security basics
Like all tech industries, cybersecurity loves it’s acronyms and fancy terms. So we introduced a new series explaining some of the more fancy terms of the cybersecurity industry. First up, the emptiness of the term Zero Trust. |
| |
The Cybersecurity Cheat Sheet: Zero Trust |
Cyber Protection Magazine is proud to introduce a new series of articles explaining fancy terms of cybersecurity. We will keep them short, to the point and with a good dose… |
|
| |
Outside voices
Our friends at EE Journal discovered an interesting product out of St. Louis, Missouri that sets up a walled garden inside a corporate network that doesn’t permit outside sources to update software, a favorite access point for malware. It’s one of many similar products on the market but at least you know about this one now. And the ever-entertaining Max Maxfield rambles on for a while before getting to the point about securing data at rest
Coming up
Electric vehicles are considered the way of the future for transportation, energy storage and a cleaner planet. They are also offering a wealth of new attack vectors for malware intrusions, ransomware and outright theft. We’ve started investigating what the potential is for chaos. We will be looking at both the problems presented and how new approaches to blockchain m might be a way of securing them. |
| |
Thanks for reading and if you liked our newsletter, please share it with friends and colleagues. |
| |
Cyber Protection Magazine
https://cyberprotection-magazine.com
| |
|